Filter
Conference contribution

Search results

  • A bootstrapping approach for developing a cyber-security ontology using textbook index terms

    Wali, A., Chun, S. A. & Geller, J., 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. p. 569-576 8 p. 6657291. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • A Blended Deep Learning Approach for Predicting User Intended Actions

    Tan, F., Wei, Z., He, J., Wu, X., Peng, B., Liu, H. & Yan, Z., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 487-496 10 p. 8594873. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • A Behavior-Aware Profiling of Smart Contracts

    Wei, X., Lu, C., Ozcan, F. R., Chen, T., Wang, B., Wu, D. & Tang, Q., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 245-258 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 305 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2D geon based generic object recognition

    Yu, X., Oria, V., Gouton, P. & Jomier, G., 2011, MM'11 - Proceedings of the 2011 ACM Multimedia Conference and Co-Located Workshops. p. 1493-1496 4 p. (MM'11 - Proceedings of the 2011 ACM Multimedia Conference and Co-Located Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution